HomeSort by relevance Sort by last modified time
    Searched full:decrypt (Results 1 - 25 of 707) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /system/vold/
vdc.rc 4 # vold will set vold.decrypt to trigger_restart_framework (default
11 # vold will set vold.decrypt to trigger_restart_framework (default
  /prebuilts/go/darwin-x86/src/crypto/cipher/
cfb.go 15 decrypt bool
25 if x.decrypt {
33 if !x.decrypt {
56 func newCFB(block Block, iv []byte, decrypt bool) Stream {
67 decrypt: decrypt,
  /prebuilts/go/linux-x86/src/crypto/cipher/
cfb.go 15 decrypt bool
25 if x.decrypt {
33 if !x.decrypt {
56 func newCFB(block Block, iv []byte, decrypt bool) Stream {
67 decrypt: decrypt,
  /system/connectivity/shill/
crypto_des_cbc_unittest.cc 101 TEST_F(CryptoDESCBCTest, Decrypt) {
106 EXPECT_TRUE(crypto_.Decrypt(kEmptyCipher, &plaintext));
108 EXPECT_TRUE(crypto_.Decrypt(kCipherText, &plaintext));
110 EXPECT_TRUE(crypto_.Decrypt(kCipherVersion1, &plaintext));
113 EXPECT_FALSE(crypto_.Decrypt("random", &plaintext));
114 EXPECT_FALSE(crypto_.Decrypt("02:random", &plaintext));
115 EXPECT_FALSE(crypto_.Decrypt("~", &plaintext));
116 EXPECT_FALSE(crypto_.Decrypt("02:~", &plaintext));
117 EXPECT_FALSE(crypto_.Decrypt(kEmptyPlain, &plaintext));
118 EXPECT_FALSE(crypto_.Decrypt(kEmptyCipherNoSentinel, &plaintext))
    [all...]
crypto_provider.cc 59 string CryptoProvider::Decrypt(const string& ciphertext) {
66 if (!crypto->Decrypt(to_decrypt, &plaintext)) {
68 << " failed to decrypt.";
73 LOG(WARNING) << "Unable to decrypt text, returning as is.";
crypto_rot47_unittest.cc 51 TEST_F(CryptoROT47Test, Decrypt) {
53 EXPECT_TRUE(crypto_.Decrypt(kCipherText, &text));
55 EXPECT_TRUE(crypto_.Decrypt(kEmpty, &text));
crypto_provider_unittest.cc 98 TEST_F(CryptoProviderTest, Decrypt) {
99 EXPECT_EQ(kPlainText, provider_.Decrypt(kPlainText));
100 EXPECT_EQ(kEmptyText, provider_.Decrypt(kEmptyText));
106 EXPECT_EQ(kPlainText, provider_.Decrypt(kROT47Text));
107 EXPECT_EQ(kPlainText, provider_.Decrypt(kDESCBCText));
108 EXPECT_EQ(kPlainText, provider_.Decrypt(kPlainText));
109 EXPECT_EQ(kEmptyText, provider_.Decrypt(kEmptyText));
  /external/opencv3/3rdparty/include/ffmpeg_/libavutil/
aes.h 47 * @param decrypt 0 for encryption, 1 for decryption
49 int av_aes_init(struct AVAES *a, const uint8_t *key, int key_bits, int decrypt);
52 * Encrypt or decrypt a buffer using a previously initialized context.
57 * @param decrypt 0 for encryption, 1 for decryption
59 void av_aes_crypt(struct AVAES *a, uint8_t *dst, const uint8_t *src, int count, uint8_t *iv, int decrypt);
blowfish.h 50 * Encrypt or decrypt a buffer using a previously initialized context.
55 * @param decrypt 0 for encryption, 1 for decryption
58 int decrypt);
61 * Encrypt or decrypt a buffer using a previously initialized context.
68 * @param decrypt 0 for encryption, 1 for decryption
71 int count, uint8_t *iv, int decrypt);
xtea.h 46 * Encrypt or decrypt a buffer using a previously initialized context.
53 * @param decrypt 0 for encryption, 1 for decryption
56 int count, uint8_t *iv, int decrypt);
  /external/tpm2/
ActivateCredential.c 32 OBJECT *object; // decrypt key
39 // Get decrypt key pointer
45 // input decrypt key must be an asymmetric, restricted decryption key
47 || object->publicArea.objectAttributes.decrypt == CLEAR
53 // Decrypt input credential data via asymmetric decryption. A
StartAuthSession.c 14 // TPM_RC_ATTRIBUTES tpmKey does not reference a decrypt key
17 // TPM_RC_HANDLE input decrypt key handle only has public portion loaded
24 // TPM_RC_VALUE secret size does not match decrypt key type; or the recovered secret
26 // RSA decrypt key, if encryptedSecret is greater than the public
36 OBJECT *tpmKey; // TPM key for decrypt salt
48 // If an decrypt key is passed in, check its validation
55 // Get pointer to loaded decrypt key
65 if(tpmKey->publicArea.objectAttributes.decrypt != SET)
ECDH_ZGen.c 15 // TPM_RC_ATTRIBUTES key referenced by keyA is restricted or not a decrypt key
34 // Input key must be a non-restricted, decrypt ECC key
39 || eccKey->publicArea.objectAttributes.decrypt != SET
RSA_Decrypt.c 16 // TPM_RC_KEY keyHandle does not reference an unrestricted decrypt key
18 // decrypt scheme
45 || rsaKey->publicArea.objectAttributes.decrypt == CLEAR)
64 // Select a scheme for decrypt.
RSA_Encrypt.c 15 // TPM_RC_ATTRIBUTES decrypt attribute is not SET in key referenced by keyHandle
18 // decrypt scheme
43 if(rsaKey->publicArea.objectAttributes.decrypt != SET)
64 // not have the decrypt attribute but that was checked above.
  /prebuilts/go/darwin-x86/src/crypto/des/
cipher.go 41 func (c *desCipher) Decrypt(dst, src []byte) { decryptBlock(c.subkeys[:], dst, src) }
65 c.cipher2.Decrypt(dst, dst)
69 func (c *tripleDESCipher) Decrypt(dst, src []byte) {
70 c.cipher3.Decrypt(dst, src)
72 c.cipher1.Decrypt(dst, dst)
  /prebuilts/go/linux-x86/src/crypto/des/
cipher.go 41 func (c *desCipher) Decrypt(dst, src []byte) { decryptBlock(c.subkeys[:], dst, src) }
65 c.cipher2.Decrypt(dst, dst)
69 func (c *tripleDESCipher) Decrypt(dst, src []byte) {
70 c.cipher3.Decrypt(dst, src)
72 c.cipher1.Decrypt(dst, dst)
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/
AESWrapEngine.java 13 * Create a regular AESWrapEngine specifying the encrypt for wrapping, decrypt for unwrapping.
21 * Create an AESWrapEngine where the underlying cipher is set to decrypt for wrapping, encrypt for unwrapping.
  /system/keymaster/
kem.h 45 // Decrypt takes an encrypted key, and outputs its clear text.
46 // Decrypt takes ownership of \p private_key.
47 virtual bool Decrypt(EC_KEY* private_key, const Buffer& encrypted_key, Buffer* output_key) = 0;
48 virtual bool Decrypt(EC_KEY* private_key, const uint8_t* encrypted_key,
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/
setup.py 35 'pyrsa-decrypt = rsa.cli:decrypt',
39 'pyrsa-decrypt-bigfile = rsa.cli:decrypt_bigfile',
  /external/fonttools/Lib/fontTools/misc/
eexec.py 21 def decrypt(cipherstring, R): function
50 print(decrypt, decrypt(testStr, 12321))
  /external/autotest/server/site_tests/network_WiFi_GTK/
control 15 This test verifies that we can continue to decrypt broadcast traffic while
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/
InputDecryptor.java 9 * an InputStream that will decrypt a stream of encrypted data.
  /external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/tests/
test_strings.py 24 decrypted = rsa.decrypt(encrypted, self.priv)
  /frameworks/av/include/drm/
drm_framework_common.h 226 * Decrypt API set for non encrypted content
230 * Decrypt API set for ES based DRM
234 * POSIX based Decrypt API set for container based DRM
238 * Decrypt API for Widevine streams
272 * Defines which decryption pattern should be used to decrypt the given content
274 * 1. Decrypt APIs for elementary stream based DRM
280 * initializeDecryptUnit(), decrypt(), and finalizeDecryptUnit()
281 * 2. Decrypt APIs for container based DRM (file format itself is encrypted)
295 * Information required to decrypt content

Completed in 369 milliseconds

1 2 3 4 5 6 7 8 91011>>